ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F9D211517BC2
|
Infrastructure Scan
ADDRESS: 0x4ad4d97836e7d442e37fb7de20cf39e1f79b8ec3
DEPLOYED: 2026-04-24 07:08:35
LAST_TX: 2026-04-30 02:51:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 18. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x08. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0x6a31ffad48c582954ee1e7bd051b272433d3a96a’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb11d9017e991114e3cdb8fc7d07f903ffe9dfe76 0xf33385f5343d1c8ad0cf1378f6ee4b8fa2f58708 0xa575d353d0ffcb349d0b0782794d753c7e762c73 0x63f1b2ec799f123c02c45d0fa785e394f78db5e7 0x3ac8d15d175eedc3d3e8779401b59c05bca8baeb 0x3824970e0133489cc8d82ff6e950b2bcbd1a735e 0x9336acf2866010020082fd22bd63656e04d4c356 0x5ac9c491b7348cbf36f34b3ad5ba952116b4b3fc 0x7ec18920a5c4dfd7d4dd2cf5d5ef2acd80ec3d80 0xfd407e1e2578736de7ee769002ce3a3018f6bb5b 0xb27b901ccfc98c3c7aacec79b1a7de86c531ce5e 0xaab71549cc7b93c80cd38b773c928a49b6344957 0xf0c3ac55c12be559b2a3d5d262f5a452cde120df 0x5881588347ced019d1a652e753c6349f238e9d34 0x09dda48249aadcd1cb191444f3cccc9c9b097dc4 0x6f625137a3e1b7a4350101c424f7e9f0d4ec66d0 0xac1ca3be2984472a802a862cd9fae84be4315874 0x17007fb1ed9876c96e111de65d97b808b26e1e7c 0xb5b003a26f915cc5dd46353ed4c08fb045ec1eee 0x05823a56084fdbd9009d90d2281a672933a3daa4

